SlideShare a Scribd company logo
1 of 12
Download to read offline
Cyber Security Career Path
Dr. Chandra Sekhar Sanaboina
Assistant Professor
Department of Computer Science and Engineering
University College of Engineering Kakinada
Jawaharlal Nehru Technological University Kakinada
Website: https://drcs.info
Youtube Channel:
https://www.youtube.com/channel/UCgoLe8rg-Y8CpMOKNDys7gA
1
Job Roles & Certifications Needed
• Security Analyst –
• Entry Level Job
• Also called as Information Systems Security Analyst or Data Security Analyst
• Certifications Required: Comptia Security+ or SSCP (Systems Security Certified Practitioner)
• Optional Certifications: CCNA or Comptia Network+
• Security Architect –
• Senior Security Analyst who manages a team of security analysts
• More Managerial and Less technical
• Certifications Required: CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker)
• Penetration Tester -
• Hardcore Technical Skills
• Deep understanding of Windows and Linux OS
• Sharp knowledge on hack tools such as nmap, wireshark, Nessus, Matasploit etc.,
• A bit knowledge on programming helps
• Certifications Required: Comptia Security+, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Practitionaer)
• Forensic Computer Analyst –
• Recruited by Police, government etc.,
• Digital Detective involved in tracing cyber crime
• Security Analyst Skills are required
• Cryptography
• Forensic Software Applications – FTK, Helix etc.,
• Certifications Required: CEH (Certified Ethical Hacker), GIAC Certifications – CFE(Certified Forensics Examiner) and CFA (Certified Forensic Analyst), CCFE (Certified Computer Forensics
Examiner)
• Cyber Security Manager –
• Senior Role in the Cyber Security Environment
• Also called as CISO (Chief Information Security Officer) or Security Director
• Certifications Required: CISSP, CISM (Certified Information Security Manager), PMP or ITIL and MBA
2
Major Certifications and Vendors
• Comptia –
• Comptia Fundamentals+
• Comptia A+
• Comptia Network+
• Comptia Security+
• Comptia CySA+ (Cyber Security Analyst)
• Comptia Pentest+
• Comptia CASP+ (Cyber Advanced Security Practioner)
Core Series
Cybersecurit
y Series
3
Major Certifications and Vendors
• EC – Council –
• CND (Certified Network Defender)
• CEH (Certified Ethical Hacker)
• CEH Master
• Penetration Testing – EC Council Certified Security Analyst
• CHFI (Certified Hacking Forensic Investigator)
• CCISO (Certified Chief Information Security Officer)
• CASE (Certified Application Security Engineer)
• CTIA (Certified Threat Intelligence Analyst)
• CSA (Certified Social Analyst)
• CBP (Certified Blockchain Professional)
4
Major Certifications and Vendors
• Cisco –
• CCENT (Cisco Certified Entry Level Network Technician)
• CCNA (Various Flavours like CCNA Security, CCNP Security, CCIE)
5
Major Certifications and Vendors
• Cisco –
• CCENT (Cisco Certified Entry Level Network Technician)
• CCNA (Various Flavours like CCNA Security, CCNP Security, CCIE)
6
Major Certifications and Vendors
• GIAC – Not that much recognized
• Incident Handler
• Penetration Tester
• Web Application Penetration Tester
• Mobile Device Security Analyst
• Expliot Researcher in advanced
• Wireless Networks
• Python Coders
• Reverse Engineering Malware****
• Certified Forensic Analyst****
• Certified Forensic Examiner****
• Cyber Threat Intelligence****
• Advanced Smart phone Forensics****
• And many more…….
7
Major Certifications and Vendors
• ISACA – not much recognized
• CISA (Certified Information Systems Auditor)
• CISM (Certified Information Security Manager)***
• CRISC (Certified in Risk and Information Systems Control)
8
Major Certifications and Vendors
• (ISC)2 -
• Associate of (ISC)2
• Entry level Certification
• CISSP (Certified Information Systems Security Practitioner)********
• Very Tough and Expensive
• Attempt only if you have experience
9
Major Certifications and Vendors
• McAfee Institute –
• CCII (Certified Cyber Intelligence Investigator)
• CMIA (Certified Media Intelligence Analyst)
• CHTI (Certified Human Trafficking Investigator)
• CORCI (Certified Organized Retail Crime Investigator)
• CCIP (Certified Cyber Intelligence Professional)
• CPCI (Certified Professional Criminal Investigator)
• CCFI (Certified Crypto currency Forensic Investigator)
• And many more…..
10
Career Path
• 4 – Year degree in Cyber Security / Computer Science / any IT related
courses / any degree in mathematics
• Self Study
• Basics of Networking (IP and MAC addresses, switches, routers, hubs, ethernet,
HTTP, HTTPS, TLS/SSL, OSI Model, DNS, DHCP, Ports, VPN etc.,)
• Basics of Computer Security (Malware, Antivirus, Firewalls, IDS, IPS, Encryption,
Biometrics, Hacking Methodology, Phishing, SQL Injection, Brute Force Attacks,
Ransomware, Social Media and Privacy Issues etc.,)
• Basics of Web Development (HTML, CSS, basics of databases, Web Servers etc.,)
• Self Study Materials –
• Comptia Network+ Certification
• Comptia Security+ Certifications
• CCNA Certification
If possible PG Degree also…
11
Internships and Jobs
• Cybersecurityventures.com
• Best Website for Cyber Securitians
• Recommended Movies
• Hackers, Fifth Estate, Snowden, War Games, Sneakers, Hackers Wanted, We are legion
• Best linkedin groups
• Cyber security group
• Penetration testing/ethical hacking
• IT governance
• Aurora cyber crime and cyber conflict research group
• Information Security Network
• Information Security Community
• ISCN *Information Security Careers Network
• Websites for Cyber Security Jobs
• Monster
• Indeed
• Cybersecjobs
• Cybersecurityjobs.net
• Cybersecurityjobsite.com
• Linkedin.com
• How to gain experience?
• Set up own lab
• www.cybrary.it
• Gain Expertise in Kali Linux OS (For Technical Cybers)
• Learn Python (For Technical Cybers)
• Get Expertise on Wireshark
12

More Related Content

Similar to Chandu cyber security career path

Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In SecurityPrasanna V
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development pathsChelsea Jarvie
 
InfoSec professional advice to university students
InfoSec professional advice to university students InfoSec professional advice to university students
InfoSec professional advice to university students Jose L. Quiñones-Borrero
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsOllie Whitehouse
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summaryudemy course
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiCRAW CYBER SECURITY PVT LTD
 
Skills you need to become a ethical hacker
Skills you need to become a ethical hackerSkills you need to become a ethical hacker
Skills you need to become a ethical hackerbegmohsin
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Ruby Meditation
 
Networking & Security Fundamentals
Networking & Security FundamentalsNetworking & Security Fundamentals
Networking & Security Fundamentalsashishsharma1506
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security fieldAhmed Musaad
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Eryk Budi Pratama
 

Similar to Chandu cyber security career path (20)

Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
 
InfoSec professional advice to university students
InfoSec professional advice to university students InfoSec professional advice to university students
InfoSec professional advice to university students
 
Jcv course contents
Jcv course contentsJcv course contents
Jcv course contents
 
Cyber Security_Chintan Patel
Cyber Security_Chintan PatelCyber Security_Chintan Patel
Cyber Security_Chintan Patel
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for BeginnersCybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
Skills you need to become a ethical hacker
Skills you need to become a ethical hackerSkills you need to become a ethical hacker
Skills you need to become a ethical hacker
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
 
Networking & Security Fundamentals
Networking & Security FundamentalsNetworking & Security Fundamentals
Networking & Security Fundamentals
 
Networking & security
Networking & securityNetworking & security
Networking & security
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Chandu cyber security career path

  • 1. Cyber Security Career Path Dr. Chandra Sekhar Sanaboina Assistant Professor Department of Computer Science and Engineering University College of Engineering Kakinada Jawaharlal Nehru Technological University Kakinada Website: https://drcs.info Youtube Channel: https://www.youtube.com/channel/UCgoLe8rg-Y8CpMOKNDys7gA 1
  • 2. Job Roles & Certifications Needed • Security Analyst – • Entry Level Job • Also called as Information Systems Security Analyst or Data Security Analyst • Certifications Required: Comptia Security+ or SSCP (Systems Security Certified Practitioner) • Optional Certifications: CCNA or Comptia Network+ • Security Architect – • Senior Security Analyst who manages a team of security analysts • More Managerial and Less technical • Certifications Required: CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) • Penetration Tester - • Hardcore Technical Skills • Deep understanding of Windows and Linux OS • Sharp knowledge on hack tools such as nmap, wireshark, Nessus, Matasploit etc., • A bit knowledge on programming helps • Certifications Required: Comptia Security+, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Practitionaer) • Forensic Computer Analyst – • Recruited by Police, government etc., • Digital Detective involved in tracing cyber crime • Security Analyst Skills are required • Cryptography • Forensic Software Applications – FTK, Helix etc., • Certifications Required: CEH (Certified Ethical Hacker), GIAC Certifications – CFE(Certified Forensics Examiner) and CFA (Certified Forensic Analyst), CCFE (Certified Computer Forensics Examiner) • Cyber Security Manager – • Senior Role in the Cyber Security Environment • Also called as CISO (Chief Information Security Officer) or Security Director • Certifications Required: CISSP, CISM (Certified Information Security Manager), PMP or ITIL and MBA 2
  • 3. Major Certifications and Vendors • Comptia – • Comptia Fundamentals+ • Comptia A+ • Comptia Network+ • Comptia Security+ • Comptia CySA+ (Cyber Security Analyst) • Comptia Pentest+ • Comptia CASP+ (Cyber Advanced Security Practioner) Core Series Cybersecurit y Series 3
  • 4. Major Certifications and Vendors • EC – Council – • CND (Certified Network Defender) • CEH (Certified Ethical Hacker) • CEH Master • Penetration Testing – EC Council Certified Security Analyst • CHFI (Certified Hacking Forensic Investigator) • CCISO (Certified Chief Information Security Officer) • CASE (Certified Application Security Engineer) • CTIA (Certified Threat Intelligence Analyst) • CSA (Certified Social Analyst) • CBP (Certified Blockchain Professional) 4
  • 5. Major Certifications and Vendors • Cisco – • CCENT (Cisco Certified Entry Level Network Technician) • CCNA (Various Flavours like CCNA Security, CCNP Security, CCIE) 5
  • 6. Major Certifications and Vendors • Cisco – • CCENT (Cisco Certified Entry Level Network Technician) • CCNA (Various Flavours like CCNA Security, CCNP Security, CCIE) 6
  • 7. Major Certifications and Vendors • GIAC – Not that much recognized • Incident Handler • Penetration Tester • Web Application Penetration Tester • Mobile Device Security Analyst • Expliot Researcher in advanced • Wireless Networks • Python Coders • Reverse Engineering Malware**** • Certified Forensic Analyst**** • Certified Forensic Examiner**** • Cyber Threat Intelligence**** • Advanced Smart phone Forensics**** • And many more……. 7
  • 8. Major Certifications and Vendors • ISACA – not much recognized • CISA (Certified Information Systems Auditor) • CISM (Certified Information Security Manager)*** • CRISC (Certified in Risk and Information Systems Control) 8
  • 9. Major Certifications and Vendors • (ISC)2 - • Associate of (ISC)2 • Entry level Certification • CISSP (Certified Information Systems Security Practitioner)******** • Very Tough and Expensive • Attempt only if you have experience 9
  • 10. Major Certifications and Vendors • McAfee Institute – • CCII (Certified Cyber Intelligence Investigator) • CMIA (Certified Media Intelligence Analyst) • CHTI (Certified Human Trafficking Investigator) • CORCI (Certified Organized Retail Crime Investigator) • CCIP (Certified Cyber Intelligence Professional) • CPCI (Certified Professional Criminal Investigator) • CCFI (Certified Crypto currency Forensic Investigator) • And many more….. 10
  • 11. Career Path • 4 – Year degree in Cyber Security / Computer Science / any IT related courses / any degree in mathematics • Self Study • Basics of Networking (IP and MAC addresses, switches, routers, hubs, ethernet, HTTP, HTTPS, TLS/SSL, OSI Model, DNS, DHCP, Ports, VPN etc.,) • Basics of Computer Security (Malware, Antivirus, Firewalls, IDS, IPS, Encryption, Biometrics, Hacking Methodology, Phishing, SQL Injection, Brute Force Attacks, Ransomware, Social Media and Privacy Issues etc.,) • Basics of Web Development (HTML, CSS, basics of databases, Web Servers etc.,) • Self Study Materials – • Comptia Network+ Certification • Comptia Security+ Certifications • CCNA Certification If possible PG Degree also… 11
  • 12. Internships and Jobs • Cybersecurityventures.com • Best Website for Cyber Securitians • Recommended Movies • Hackers, Fifth Estate, Snowden, War Games, Sneakers, Hackers Wanted, We are legion • Best linkedin groups • Cyber security group • Penetration testing/ethical hacking • IT governance • Aurora cyber crime and cyber conflict research group • Information Security Network • Information Security Community • ISCN *Information Security Careers Network • Websites for Cyber Security Jobs • Monster • Indeed • Cybersecjobs • Cybersecurityjobs.net • Cybersecurityjobsite.com • Linkedin.com • How to gain experience? • Set up own lab • www.cybrary.it • Gain Expertise in Kali Linux OS (For Technical Cybers) • Learn Python (For Technical Cybers) • Get Expertise on Wireshark 12